网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Company.com is adding HACMP to an existing pair of nodes. One node is using EtherChannel  with only one adapter. The other node is using regular Ethernet connection to the switch. The customer is going to increase the number of network interfaces to two for each node.  What other considerations need to be addressed in a HACMP environment?()  

  • A、 Al interfaces used for HACMP heartbeats must be identical. Differences in the interfaces will cause heartbeat failure.
  • B、 The network interfaces should all be configured with the same frame type. The use of regular Ethernet frames is mandatory.
  • C、 Network interfaces for HACMP must be all the same,Ethernet or 802.3. It does not matter which,as long as they are all the same.
  • D、 HACMP can use any network interface supported by AIX. The options on the various interfaces are masked by the Ethernet switch and do not affect HACMP.

参考答案

更多 “ Company.com is adding HACMP to an existing pair of nodes. One node is using EtherChannel  with only one adapter. The other node is using regular Ethernet connection to the switch. The customer is going to increase the number of network interfaces to two for each node.  What other considerations need to be addressed in a HACMP environment?()  A、 Al interfaces used for HACMP heartbeats must be identical. Differences in the interfaces will cause heartbeat failure.B、 The network interfaces should all be configured with the same frame type. The use of regular Ethernet frames is mandatory.C、 Network interfaces for HACMP must be all the same,Ethernet or 802.3. It does not matter which,as long as they are all the same.D、 HACMP can use any network interface supported by AIX. The options on the various interfaces are masked by the Ethernet switch and do not affect HACMP.” 相关考题
考题 The room is a little small; _______ it is so hot. A.in additionB.in addition toC.additionalD.adding

考题 Which two functions require the use of the CLI?() (Choose two.) A. adding a VLANB. adding a clusterC. running a tcpdumpD. adding a target server

考题 Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem.Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A. dig company.com nsB. ipconfig/allC. ifconfig-aD. dig company.com mx

考题 When is it necessary for a TDA to be conducted on an installed IBM DS8800? () A. when installing SSD drivesB. when adding a new workloadC. when installing SATA drivesD. when adding more Linux hosts

考题 You are employed as the exchange administrator at Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging solution.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange server 2010 mailbox server named - ex01.during the course of the day you receive notification from management to determine which users that have the biggest mailboxes on - ex01.What should you do?()A、This can be accomplished by adding the MSExchangeIS Mailbox performance counters to the Performance Monitor.B、This can be accomplished by running the Get-MailBoxStatistics cmdlet.C、This can be accomplished by running the Get-StoreUsageStatistics cmdlet.D、This can be accomplished by adding the MSExchangeIS Client performance counters to the Performance Monitor.

考题 Which of the following are methods EIGRP uses to initially populate (seed) its EIGRP topology table, before learning topology data from neighbors?()A、By adding all subnets listed by the show ip route connected commandB、By adding the subnets of working interfaces over which static neighbors have been definedC、By adding subnets redistributed on the local router from another routing sourceD、By adding all subnets listed by the show ip route static command

考题 Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx

考题 Company.com complains that an outage is required when adding a new filesystem to cluster. The  System management function of HACMP (C-SPOC) functions in which manner when adding filesystems to a cluster?()  A、 Adds to all nodes with the cluster running.B、 Adds to all nodes with the cluster stopped.C、 Adds with the cluster running,uses "Lazy Update" to perform the logical volume synchronization.D、 Adds to all nodes with the cluster running but requires the volume groups to be exported andimported after.

考题 Which of the following is NOT a common or correct use of a custom control?()A、Adding a company logo to business documentsB、As the UI widgets for 1 specificXPage that will never be replicated by any other XPages, everC、Adding mailing label information to mail and memo pagesD、As a control that needs to appear conditionally, depending on the result of a formula

考题 Company.com is adding a new I/O drawer to an existing p5-570 with four LPARs and wants to re-balance the network cards in the I/O drawers. What is the best way to accomplish this?()A、Add the devices as virtual adapters to a VIO server first,then add the I/O drawer and create the shared ethernet adaptersB、Power down the partitions,run the diag a command when the system is brought back up and reconfigure the network cardsC、Use the rmdev command to remove the devices,shut down the partitions and move the cads,then run the cfgmgr command after rebootD、Detach the network cards,run rmdev on the devices and then dynamically reassign theadapters to the partitions and reconfigure

考题 Which two functions require the use of the CLI?() (Choose two.)A、adding a VLANB、adding a clusterC、running a tcpdumpD、adding a target server

考题 How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()A、By adding two separate connections in the connections dialog boxB、By adding two separate intranet Controllers under the configuration hierarchyC、By adding one intranet Controller and one SA under the configuration hierarchyD、By adding two URLs under a connection in the connections dialog box

考题 A common approach to solve application performance issues is to add more hardware. Which two  reasons describe why this alone does not always solve performance problems?()A、There may be a bottleneck in the application that additional hardware would not solve.B、Adding more hardware is costly and time consuming.C、Adding hardware at the application layer may place additional load on an already overloaded database, network appliance, or storage system.D、Adding more hardware may introduce new configuration requirements that need to be tested.

考题 How can an Oracle WebLogic cluster’s capacity be increased ?()A、 by adding server instances to the cluster on an existing machineB、 by adding machines to host server for more clustered instancesC、 by adding machines to the cluster to host the incremental server instancesD、 by adding node managers to an existing machine

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

考题 You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Stockholm where you are located.The organization contains two exchange server 2010 mailbox servers, the mailbox servers are named -ex01 and - ex02.-ex01 is configured to host a public folder named kingdata.to ensure productivity within the organization you need to ensure that kingdata remains online and available if -ex01 becomes offline.What should you do?()A、you should consider adding -ex01 and -ex02 to a database availability group (dag)B、you should consider changing the folder limitations from the properties of KINGDATAC、you should consider adding -ex02 from the properties of kingdataD、you should consider adding -ex01 and -ex02 to a client access server array

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com.All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have created and linked a new Group Policy object (GPO) to an organizational unit (OU), named ABCServ, which host the computer accounts for servers in the ABC.com domain.You have been tasked with adding a group to a local group on all servers in the ABC.com domain.This group should not, however, be removed from the local group.  Which of the following actions should you take?()A、You should consider adding a restricted group.B、You should consider adding a global group.C、You should consider adding a user group.D、You should consider adding a server group.

考题 You are creating a Windows Forms application by using the .NET Framework 3.5. You create a new form in your application.You add 100 controls at run time in the Load event handler of the form.  Users report that the form takes a long time to get displayed. You need to improve the performance of the form. What should you do?()A、Call the InitLayout method of the form before adding all the controls.Call the PerformLayout method of the form after adding all the controls.B、Call the InitLayout method of the form before adding all the controls.Call the ResumeLayout method of the form after adding all the controls.C、Call the SuspendLayout method of the form before adding all the controls.Call the PerformLayout method of the form after adding all the controls.D、Call the SuspendLayout method of the form before adding all the controls.Call the ResumeLayout method of the form after adding all the controls.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B The best option is to set up a content filtering feature to comply with the Company.com security policy.C The best option is to create a transport rule to comply with the Company.com security policy.D The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 多选题In RMAN, when the RESYNC CATALOG command is issued, in which two situations does the command file actually perform synchronization?()AAfter the COPY command.BAfter adding a data file in the target database.CAfter adding a tablespace in the target database.DAfter adding a tablespace in the catalog database.EAfter dropping a data file in the catalog database.FAfter running SQL Loader to load a large amount of data.

考题 单选题When is it necessary for a TDA to be conducted on an installed IBM DS8800? ()A when installing SSD drivesB when adding a new workloadC when installing SATA drivesD when adding more Linux hosts

考题 单选题You are employed as the exchange administrator at Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging solution.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange server 2010 mailbox server named - ex01.during the course of the day you receive notification from management to determine which users that have the biggest mailboxes on - ex01.What should you do?()A This can be accomplished by adding the MSExchangeIS Mailbox performance counters to the Performance Monitor.B This can be accomplished by running the Get-MailBoxStatistics cmdlet.C This can be accomplished by running the Get-StoreUsageStatistics cmdlet.D This can be accomplished by adding the MSExchangeIS Client performance counters to the Performance Monitor.

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()A You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C You should consider having mail enabled for KingPublic.D You should consider having the author role assigned to Anonymous.

考题 单选题The strength of a deck will be increased by adding().A camberB deck beam bracketsC hatch beamsD sheer

考题 多选题How can an Oracle WebLogic cluster’s capacity be increased ?()Aby adding server instances to the cluster on an existing machineBby adding machines to host server for more clustered instancesCby adding machines to the cluster to host the incremental server instancesDby adding node managers to an existing machine

考题 多选题Which of the following are methods EIGRP uses to initially populate (seed) its EIGRP topology table, before learning topology data from neighbors?()ABy adding all subnets listed by the show ip route connected commandBBy adding the subnets of working interfaces over which static neighbors have been definedCBy adding subnets redistributed on the local router from another routing sourceDBy adding all subnets listed by the show ip route static command